Security+ Training Course Index: http://professormesser.link/sy0401 Professor Messer’s Course Notes: http://professormesser.link/sy0401cn Frequently Asked Questions: http://professormesser.link/faq – – – – – Asymmetric cryptography has enabled secure communication, digital signatures, and much more. In this video, you’ll learn about the well-known asymmetric algorithms of RSA and Diffie-Hellman. – – – – – DownloadContinue Reading

Security+ Training Course Index: http://professormesser.link/sy0401 Professor Messer’s Course Notes: http://professormesser.link/sy0401cn Frequently Asked Questions: http://professormesser.link/faq – – – – – There are many hash functions for many different circumstances. In this video, you’ll learn about MD5, SHA, RIPEMD, and HMAC hash functions. – – – – – Download entire video course:Continue Reading

Security+ Training Course Index: http://professormesser.link/sy0401 Professor Messer’s Course Notes: http://professormesser.link/sy0401cn Frequently Asked Questions: http://professormesser.link/faq – – – – – The creation and use of cryptography has also included new ways to keep our data private. In this video, you’ll learn about the use of elliptic curves to create encryption keysContinue Reading

Security+ Training Course Index: http://professormesser.link/sy0401 Professor Messer’s Course Notes: http://professormesser.link/sy0401cn Frequently Asked Questions: http://professormesser.link/faq – – – – – Our modern applications make extensive use of cryptography. In this video, you’ll learn the basics of cryptography and some of the history of ciphers and secrecy. – – – – –Continue Reading

I introduce the basic principles of quantum cryptography, and discuss today’s status of its technology, with examples of optical schemes and components. No prior knowledge of quantum mechanics is required :). This first lecture is about the basics of quantum cryptography. Lectures 2 and 3 cover quantum hacking: Presentation slidesContinue Reading